Software Requirement Home Security System Project
Software Requirement Home Security System Project
Specification
for
Table of Contents
Table of Contents .......................................................................................................................... ii
Revision History ............................................................................................................................ ii
1. Introduction ..............................................................................................................................1
1.1 Purpose .......................................................................................................................................... 1
1.2 Document Convention: ................................................................................................................. 1
1.3 Intended Audience and Reading Suggestions ............................................................................... 1
1.4 Product Scope ............................................................................................................................... 1
2. Overall Description ..................................................................................................................2
2.1 Product Perspective ....................................................................................................................... 2
2.2 Product Functions ......................................................................................................................... 2
2.3 User Classes and Characteristics................................................................................................... 3
2.4 Operating Environment ................................................................................................................. 4
2.5 Design and Implementation Constraints ....................................................................................... 5
2.6 User Documentation ..................................................................................................................... 6
2.7 Assumptions and Dependencies.................................................................................................... 6
3. External Interface Requirements ...........................................................................................7
3.1 User Interfaces .............................................................................................................................. 7
3.2 Hardware Interfaces ...................................................................................................................... 7
3.3 Software Interfaces ....................................................................................................................... 7
3.4 Communications Interfaces........................................................................................................... 7
4. System Features .......................................................................................................................8
4.1 System Feature 1 ........................................................................................................................... 8
4.2 System Feature 2 (and so on) ........................................................................................................ 8
5. Other Nonfunctional Requirements .......................................................................................9
5.1 Performance Requirements ........................................................................................................... 9
5.2 Safety Requirements: .................................................................................................................... 9
5.3 Security Requirements .................................................................................................................. 9
5.4 Software Quality Attributes ........................................................................................................ 10
Revision History
Name Date Reason For Changes Version
Software Requirements Specification for Home Security using Motion Sensing Page 1
1. Introduction
1.1 Purpose
This document describes the software requirements for an automated Home Security system using Motion
Sensor and its Specification. This Software Requirements Specification (SRS) provides a description of all
the functions, specifications, external behaviors, design constraints, requirements (function and non-
functional) and other factors necessary to provide a complete and comprehensive description of the proposed
Home security system.
This document is written primarily as a learning project for the course Product Design and Development in
Avionics Engineering department faculty involved in the Home Security System: Miss Fizza Shaukat.
Further audiences for this document are the remaining stakeholders, such as developers, programmers,
integrators, operators, and maintainers of the proposed system.
2. Overall Description
The project seeks to implement a remote home security using open-source electronic platform for houses and
different establishments. This study looked on different problems encountered by house owners with regards
to security such as targeted by the intruders/burglars because of the low-level security. To prevent crimes that
were illustrated by the proponents at the proposed project that would include the alarm and motion detects.
The siren alarm may be set on when an intruder/theft enters the house where motion is detected. The
homeowners will receive a message from the system to let the owners know that an intruder is entered their
property.
2.2.2 APPLICATIONS
• Many users, security specialists and administrators rely on passwords to authenticate the identity of
those wishing to gain access to a security system.
• Passwords need to incorporate more than just letters for the greatest security, making use of numbers
and other symbols available on the keyboard.
• Those wishing to gain access by defeating the password security system may try commonly used
passwords, or to hack the password system in order to gain unauthorized entry.
2.3.2 Biometrics
• Biometric devices detect the identity of the person trying to gain access to a security system.
• In home security system, biometric scans a user's fingerprint to authenticate the person's identity
before allowing the user access to the system.
2.3.3 Certificates
• Third-party digital security companies (called certification authorities) issue digital certificates to
companies or individuals. Digital certificates vary in their complexity, depending on the security
needs of the individual or company.
• The certification authority issues a certificate that the user embeds on security system. When the user
attempts to gain access to secured areas on a network, or even secured websites, another software
program at the receiving end of the request validates the required digital certificate.
• An authorized individual may use a smart card to authenticate his identity in order to gain access to
secured devices or areas.
• Smart cards look much like a credit card and have a microchip and memory embedded in the card.
• The user inserts a smart card into a reader device and enters a password. A remote server checks the
smart card against the entered password.
• If the user enters incorrect passwords too many times in a row, the reader device can be programmed
to destroy the smart card to eliminate unauthorized access.
• If a user loses his smart card, a network administrator can turn the card off so it can no longer be
used to gain access to secured devices or areas.
➢ Database services
➢ The user passes the SQL requests as a message to the database server, the result of each SQL
command is returned to the same database server.
➢ communication services:
➢ when security alarm is in enable mode then the user passes the request as a calls or messages
to the apple device.
Software Requirements Specification for Home Security using Motion Sensing Page 4
2.4.1 Software
1. Objective C
➢ Objective-C’s features often allow for flexible, and often easy, solutions to programming
issues. Delegating methods to other objects and remote invocation can be easily
implemented using categories and message forwarding.
2. SQL server (2005/2008)
➢ SQL Server 2005 (codename Yukon), released in October 2005, is the successor to SQL
Server 2000. It included native support for managing XML data, in addition to relational
data. For this purpose, it defined an xml data type that could be used either as a data type in
database columns or as literals in queries. SQL Server 2008 also natively supports
hierarchical data
3. SQL light:
➢ A high-level overview of what SQLite is and why you might be interested in using it. This
document describes situations where SQLite is an appropriate database engine to use versus
situations where a client/server database engine might be a better choice.
4. Visual studio (2005/2008)
➢ Microsoft Visual Studio is an integrated development environment (IDE) from Microsoft. It
is used to develop console and graphical user interface applications along with Windows
Forms applications, web sites, web applications, and web services in both native codes
together with managed code for all platforms supported by Microsoft Windows, Windows
Mobile, Windows CE, .NET Framework, .NET Compact Framework and Microsoft
Silverlight.
5. Window 7 and above (min 01GB RAM)
➢ Internet access (fees may apply). Windows XP Mode requires an additional 1 GB of RAM
and an additional 15 GB of available hard disk space. PCs with multi-core processors. All
32-bit versions of Windows 7 can support up to 32 processor cores, while 64-bit versions
can support up to 256 processor cores.
2.4.2 Hardware:
➢ security system has the ability to range from a simple motion sensor that turns on a light or an
alarm to an entire suite of detectors – motion, door/window sensors, glass-break, cameras –
setting off the most advanced applications employing cutting edge technology.
➢ Not only can your highly developed system activate lights and alarms, but also it has the
capability of notifying the proper emergency response team.
➢ You can also program your system to notify you about an intrusion or emergency via email,
cellular phone, instant message, or other online notifications. When you are trying to secure
your home, a home security system can go all the way.
➢ English
➢ It should be voice alert and message alert inside Home security application.
1. burglary
➢ The system shoots an alarm in case a burglary takes place and sends an instant notification to
our mobile phone.
2. Breakdown
➢ In case someone intentionally tries to break the security system before barging inside the
system by default sends an alarm notification to the user.
Software Requirements Specification for Home Security using Motion Sensing Page 6
➢ Camera
➢ This device takes the images and videos of different areas and sends the updates to the server
as well as the device.
➢ Calls and messages settings
➢ The user receives instant information with an SMS or a notification on desired App.
4. System Features
The system features of the automated HSS are organized in the following way
General features, features for authorization, features for a transaction.
.
Software Requirements Specification for Home Security using Motion Sensing Page 9
Install at least one fire alarm on each floor of the house or residence and outside all sleeping areas.
Some fire-safety advocates recommend installing fire alarms inside each sleeping area if sleeping
with the door closed.
An added feature of safety switches is extension leads that come in handy when you’re using power
tools outdoors.
• Motion detector lights trouble shooting.
➢ Installing motion detector lights in the surroundings of your house is a total relief from the
fear of theft, intruders, lousy animals etc. These lights not only help you see through the
darkness but come on with an alarming bang in case of hunches. On the off chance if these
lights are malfunctioning, you need to troubleshoot the problems at your earliest
References:
http://en.wikipedia.org/wiki/Microsoft_SQL_Server
http://technet.microsoft.com/enus/library/cc770499(WS.10).aspx
http://hss.fatih.edu.tr/docs/pdf/srs.pdf
http://www.cs.colorado.edu/~kena/classes/6448/s01/examples/nickm3.pdf
http://www.cs.colorado.edu/~kena/classes/6448/s01/examples/tomp3.pdf
https://www.scribd.com/doc/76026766/Home-Security-SRS-documentation
https://t4tutorials.com/srs-documentation-of-home-automation-and-security-system-
android-project/#